[1] |
WEI Zihui, LI Xiaoyang, WANG Le, CAI Daxin, YE Xingyue, DING Zhenjun.
Improved TDOA 3d positioning algorithm based on adaptive Levy flight
[J]. Journal of Hebei University(Natural Science Edition), 2023, 43(2): 207-215.
|
[2] |
YANG Xiaohui, WANG Weibin.
Spammer detection model based on hierarchical attention mechanism
[J]. Journal of Hebei University(Natural Science Edition), 2023, 43(1): 95-102.
|
[3] |
WEI Mingjun, ZHANG Xinnan, LIU Yazhi, ZHOU Taiyu.
A network intrusion detection method based on SSA-BRF
[J]. Journal of Hebei University(Natural Science Edition), 2022, 42(5): 552-560.
|
[4] |
CHANG Tieyuan, LIU Weina, ZHANG Yan, LI Huiya.
Optimized LEACH protocol based on distance and energy of cluster head
[J]. Journal of Hebei University (Natural Science Edition), 2019, 39(2): 194-200.
|
[5] |
TIAN Junfeng, CAI Hongyun.
Shilling attacks and security of recommender systems
[J]. Journal of Hebei University (Natural Science Edition), 2018, 38(6): 640-647.
|
[6] |
HE Zhiqiang, LIN Yongjun.
A LARS scheduling algorithm based on classification improvement and its dynamic parameter performance analysis
[J]. Journal of Hebei University (Natural Science Edition), 2017, 37(5): 537-544.
|
[7] |
MA Guofu,WANG Zixian,MA Shengli.
Analysis of the effectiveness of machine learning model in predicting the risk of inmates
[J]. Journal of Hebei University (Natural Science Edition), 2017, 37(4): 426-433.
|
[8] |
GAO Ni, HE Yiyue, CHANG Yanshuo, WANG Mengyang.
A dynamic and comprehensive quantitative scoring method of vulnerability severity
[J]. Journal of Hebei University (Natural Science Edition), 2017, 37(4): 405-410.
|
[9] |
ZHANG Xizhong,XU Jianmin.
Research on document similarity based on terms synonymous relationship
[J]. Journal of Hebei University (Natural Science Edition), 2017, 37(1): 108-112.
|
[10] |
MA Guofu,WANG Zixian,MA Shengli.
Prediction of the risk of offenders based on big data
[J]. Journal of Hebei University (Natural Science Edition), 2016, 36(6): 657-666.
|
[11] |
MA Guofu,MA Shengli,WANG Zixian,LI Shuangyin,CHENG Yusi.
Application of data recovery in the electronic data forensics and judicial identification
[J]. Journal of Hebei University (Natural Science Edition), 2015, 35(5): 538-545.
|
[12] |
LIU Haiqin.
Research on resource search mechanism in hybrid P2P network
[J]. Journal of Hebei University (Natural Science Edition), 2015, 35(3): 311-315.
|
[13] |
XIAO Xianqian,ZHU Junping,JING Xu,MA Qiaoe.
One-class intrusion detection technique based on Bayesian approach
[J]. Journal of Hebei University (Natural Science Edition), 2014, 34(1): 7-13.
|
[14] |
MA Guofu,WANG Zixian,WANG Kuipeng.
On electronic judicial identification model based on evidence chain
[J]. Journal of Hebei University (Natural Science Edition), 2013, 33(3): 317-323.
|
[15] |
WANG Jianling,LI Renling,WANG Hengcao,WANG Tiezhu.
Multi-layer intrusion tolerant mechanism for Web services
[J]. Journal of Hebei University (Natural Science Edition), 2012, 32(5): 545-549.
|